Prof. Dr. habil. Steffen Wendzel
ZFT | Zentrum für Forschung und Technologie, Hochschule Worms
Wendzel, Steffen; Caviglione, Luca; Mazurczyk, Wojciech et al.
A Generic Taxonomy for Steganography MethodsACM Computing Surveys. Bd. 57. H. 9. Association for Computing Machinery (ACM) 2025 S. 1 - 37
Petrov, Denis; Ruffing, Pascal; Zillien, Sebastian et al.
Domainator: Detecting and Identifying DNS-Tunneling Malware Using Metadata SequencesLecture Notes in Computer Science. Springer Nature Switzerland 2025 S. 118 - 140
Schymiczek, Jeff; Schmidbauer, Tobias; Wendzel, Steffen
A Case Study on the Detection of Hash-Chain-based Covert Channels Using Heuristics and Machine LearningProceedings of the 19th International Conference on Availability, Reliability and Security. New York: ACM 2024 S. 1 - 10
Strachanski, Fabian; Petrov, Denis; Schmidbauer, Tobias et al.
A Comprehensive Pattern-based Overview of StegomalwareProceedings of the 19th International Conference on Availability, Reliability and Security. New York: ACM 2024 S. 1 - 10
Dittmann, Jana; Krätzer, Christian; Kiltz, Stefan et al.
Attribution von verdeckten (Informations-)Kanälen im Bereich kritischer Infrastrukturen und Potentiale für Prävention und Reaktion (ATTRIBUT)Steffen Wendzel et al. (Hrsg). GI Sicherheit 2024. Bonn. 2024 S. 265 - 268 (LNI P-345)
Ritjoho, N.; Phumara, P.; Buanill, Y. et al.
Development of the trigger-controlling system for the proton computed tomography prototypeNuclear Instruments and Methods in Physics Research Section A: Accelerators, Spectrometers, Detectors and Associated Equipment. Bd. 1072. Elsevier BV 2024 S. 170125
Wendzel, Steffen; Schmidbauer, Tobias; Zillien, Sebastian et al.
DYST (Did You See That?): An Amplified Covert Channel That Points To Previously Seen DataTransactions on Dependable and Secure Computing. Bd. 0. IEEE 2024 S. 1 - 18
Wendzel, Steffen; Mileva, Aleksandra; Franqueira, Virginia N. L. et al.
Editorial: Fighting Cybersecurity Risks from a Multidisciplinary PerspectiveJournal of Universal Computer Science (JUCS). Bd. 30. H. 9. Klagenfurt: Pensoft Publishers 2024 S. 1137 - 1139
Zillien, Sebastian; Schmidbauer, Tobias; Kubek, Mario et al.
Look What’s There! Utilizing the Internet’s Existing Data for Censorship Circumvention with OPPRESSIONProc. 19th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2024). New York: ACM 2024 S. 1 - 16
Keller, Jörg; Heßeling, Carina; Wendzel, Steffen
Robust and Homomorphic Covert Channels in Streams of Numeric DataProceedings of the 19th International Conference on Availability, Reliability and Security. New York: ACM 2024 S. 1 - 10
